First published: Thu May 18 2017(Updated: )
GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2017-9040.
The severity of CVE-2017-9040 is a denial of service (DoS) vulnerability.
GNU Binutils versions 2.26.1-1ubuntu1~16.04.8 and later, 2.29-1, 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5 are affected by CVE-2017-9040.
A remote attacker can exploit CVE-2017-9040 by sending a crafted ELF file that triggers a large memory-allocation attempt, causing a NULL pointer dereference and application crash.
To fix CVE-2017-9040, you should update your GNU Binutils installation to a version that includes the provided security patches.